Follow

Submissions from 2011

Link

Information leakage through second hand USB flash drives within the United Kingdom, Chaerani Widya, Nathan Clarke, and Christopher Bolan

Link

Why Australia's e-health system will be a vulnerable national asset, Patricia A. Williams

Link

Help or hindrance: The practicality of applying security standards in healthcare, Patricia A H Williams

Link

Is the Biggest Threat to Medical Information Simply a Lack of Understanding?, Patricia A.H. Williams

Link

Arbuscular mycorrhizal fungi can alter some root characters and physiological status in trifoliate orange (Poncirus trifoliata L. Raf.) seedlings, Qiang-Sheng Wu, Ying-Ning Zou, Xin-Hua He, and Peng Luo

Link

Differences of hyphal and soil phosphatase activities in drought-stressed mycorrhizal trifoliate orange (Poncirus trifoliata) seedlings, Qiang-Sheng Wu, Ying-Ning N Zou, and Xinhua He

Link

Studies on Pareto-based multi-objective Competitive Coevolutionary Dynamics, F Zeng, J Decraene, M Low, W Cai, and Philip Hingston

Link

R-tfidf, A variety of tf-idf Term Weighting Strategy in Document Categorization, Dengya Zhu and Jitian Xiao

Submissions from 2010

Link

A study of audience responses to the media discourse about the 'Other': The Fear of Terrorism between Australian Muslims and the Broader Community, Anne Aly

Link

Fear, victimisation and identity: The community victimisation perspective and social inclusion of Australian Muslims, Anne Aly

Link

The Internet as Ideological Battleground, Anne Aly

Link

Information Operations Matters: Best practices, Leigh Armistead

Link

An eAgriculture-based Decision Support Framework for Information Dissemination, Leisa Armstrong, Dean Diepeveen, and Khumphicha Tantisantisom

PDF

A model for the measurement and presentation of participation awareness in online groupware systems, Greg Baatard

Link

Using Traffic Analysis to Identify Tor Usage - A Proposed Study, John Barker, Peter Hannay, and Christopher Bolan

Link

Rooting theories of plant community ecology in microbial interactions, James D. Bever, Ian A. Dickie, Evalina Facelli, Jose M. Facelli, John Klironomos, Mari Moora, Matthias C. Rillig, William D. Stock, Mark Tibbett, and Martin Zobel

PDF

Analysis avoidance techniques of malicious software, Murray Brand

Link

National security: A propositional study to develop resilience indicators as an aid to personnel vetting, David Brooks, Jeff Corkill, Julie-Ann Pooley, Lynne Cohen, Cath Ferguson, and Craig Harms

PDF

The significance of learning style with respect to achievement in first year programming students, Vivian Campbell and Michael Johnstone

Link

An implementation of a garment-fitting simulation system using laser scanned 3D body data, Changsuk Cho, Jun-Young Park, Adrian Boeing, and Philip Hingston

Link

Carbon and nitrogen translocation in response to shading of the seagrass Posidonia sinuosa, Catherine J. Collier, Patricia Prado, and Paul Lavery

PDF

Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems, Michael P. Coole

Link

Hardware Implementation of the Self Assessment Manikin, Warren Creemers and Philip Hingston

Link

Phreatophytic Vegetation Response to Climatic and Abstraction-Induced Groundwater Drawdown: Examples of Long-Term Spatial and Temporal Variability in Community Response, Raymond Froend and Beate Sommer

PDF

Light reductions drive macroinvertebrate changes in Amphibolis griffithii seagrass habitat, Adam Gartner, Paul S. Lavery, Kathryn McMahon, Anne Brearley, and Helen Barwick

Link

Fireguard - A Secure Browser with Reduced Forensic Footprint, Don Griffiths and Peter James

PDF

Risk mitigation and culture: an examination of the utility of cultural cognition theory in determining operational security cultures in a healthcare environment, Melvyn Griffiths

PDF

An investigation into online teaching and the delivery of computer science topics : practice, content and environmental factors, Yuwanuch Gulatee

Link

The 2010 IDN Homograph Attack Mitigation Survey, Peter Hannay and Christopher Bolan

Link

Differentiation of benthic marine primary producers using stable isotopes and fatty acids: Implications to food web studies, Christine E. Hanson, Glenn A. Hyndes, and Shao Fang Wang

PDF

A New Design for a Turing Test for Bots, Philip Hingston

PDF

Evolving Group Strategies for IPD, Philip Hingston

PDF

RedTNet: A network model for strategy games, Philip Hingston, Mike Preuss, and Daniel Spierling

PDF

A Distributed and Cooperative User Authentication Framework, C.G. Hocking, Steven Furnell, Nathan Clarke, and P L Reynolds

The conservation status of freshwater crayfish: the basis for concern, listing and recovery processes, and community involvement, Pierre Horwitz

PDF

Analysis of Hu's Moment Invariants on Image Scaling and Rotation, Zhihu Huang and Jinsong Leng

PDF

An Online Ballistics Imaging System for Firearm Identification, Zhihu Huang and Jinsong Leng

PDF

A Novel Binarization Algorithm for Ballistics Imaging Systems, Zhihu Huang and Jinsong Leng

Link

New technologies: dissonance, influence and radical behaviours, William E. Hutchinson

Link

Influence Operations and Behavioural Change, William Hutchinson and Matthew Warren

PDF

Do different levels of fishing pressure, through spatial management, influence communities and ecological interactions in seagrass meadows in South Western Australia?, Karina Inostroza

Link

Assessing image-based authentication techniques in a web-based environment, M. Z. Jali, Steven M. Furnell, and P. S. Dowland

PDF

How do you make information security user friendly?, Andrew Jones

PDF

Digital forensics and the issues of identity, Andrew Jones and Thomas Martin

PDF

Remote access forensics for VNC and RDP on Windows platform, Paresh Kerai

Link

Predator-Baiting Experiments for the Conservation of Rock-Wallabies in Western Australia: 25-Year Review with Recent Advances, J E. Kinnear, C J. Krebs, Craig Pentland, P Orell, Christopher Holme, and Reino Karvinen

Link

Patterns Relevant to the Temporal Data-Context of an Alarm of Interest, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

Link

Computational Intelligence for Functional Testing, Chiou Peng Lam

PDF

Personal exposure of children to formaldehyde in Perth, Western Australia, Victoria S. Lazenby

Link

Adaptive T-S type Rough-Fuzzy Inference Systems (ARFIS) for Mobile Robot Navigation, Chang Su Lee

Link

Quantitative determination of glucoraphanin in Brassica vegetables by micellar electrokinetic capillary chromatography, Iris Lee, Mary C. Boyce, and Michael Breadmore

PDF

A Novel Subspace Outlier Detection Approach in High Dimensional Data Sets, Jinsong Leng

Link

Mining Outliers in Correlated Subspaces for High Dimensional Data Sets, Jinsong Leng and Tzung-Pei Hong

Analyzing Texture Features of Ballistic Projectile Images for Firearm Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li

Link

Optical Imaging and Analysis of Firing-pin Marks for Ballistics Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li

PDF

A Wrapper-Based Feature Selection for Analysis of Large Data Sets, Jinsong Leng, Craig Valli, and Leisa Armstrong

PDF

Android forensics: Simplifying cell phone examinations, Jeff Lessard and Gary Kessler

Link

A novel ballistics imaging system for firearm identification, Dongguang Li

Link

A novel binarization algorithm for ballistics firearm identification, Dongguang Li

Link

Color seal segmentation and identification, Dongguang Li

PDF

Behaviour profiling on mobile devices, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Cross-Cultural Education: Learning Methodology and Behaviour Analysis for Asian Students in IT Field of Australian Universities, Jie Lu, Kum Chin, Juan Yao, Jun Xu, and Jitian Xiao

Link

State Model Diagrams - A Universal, Model Driven Method for Network System Configuration and Management, Stanislaw Maj

Link

An Evaluation of Firewall Configuration Methods, Stanislaw Maj, Woratat Makasiranondh, and David Veal

Link

State Model Diagrams - A Universal Runtime Network Management Tool, Stanislaw Maj, Woratat Makasiranondh, and David Veal

Link

An Evaluation of State Model Diagrams for Secure Network Configuration and Management, Stanislaw Maj and David Veal

Link

Evaluating Layer 3 Device Tunnelling and Access Control List Security Bandwidths Using B-node Theory, Stanislaw Maj and David Veal

Link

Parsimony Analysis - A Novel Method of Structured Knowledge Representation for Teaching Computer Science, Stanislaw Maj and David Veal

Link

Using State Model Diagrams to Manage Secure Layer 2 Switches, Stanislaw Maj and David Veal

Link

A Preliminary Evaluation of the new Cisco Network Security Course, Stanislaw Maj, David Veal, and Lotfi Yassa

Link

An integrated multimedia based platform for teaching network security, Woratat Makasiranondh, Stanislaw Maj, and David Veal

Link

Critical infrastructure protection risk modelling with games technology, Martin Masek, Adrian Boeing, and William Bailey

Link

Vulnerability of organic acid tolerant wetland biota to the effects of inorganic acidification, Clinton D. McCullough and Pierre Horwitz

Link

Factors affecting the sustainability of computer information systems: embedding new technology into a hospital environment, Donald Mcdermid, Linda Kristjanson, and Nigel Spry

Link

An information security governance encounter for Australian primary care health providers, Donald Mcdermid, Rachel Mahncke, and Patricia Williams

PDF

Estimation of prenatal exposure to glyphosate using maternal exposure assessment techniques, Heather L. McQueen

Link

The growing need for on-scene triage of mobile devices, Richard P. Mislan, Eoghan Casey, and Gary C. Kessler

PDF

Where new meanings spring: The relationship between Indigenous cultural meanings for freshwater springs and management practices: Analysis of stories from Kalbarri, Western Australia, Tamara Lee Murdock

PDF

An intelligence model for terrorist incident prevention for Australian police: A systemic investigation, Simon O’Rourke

Link

Breaches in Medical Information Security: The Problem of Reporting, Neha Patel and Patricia Williams

PDF

Defining appropriate options for post-closure land use of the Tamala Park Landfill in Western Australia, Marie Lourdes Raphael

PDF

Information technology capability within small-medium enterprises, Aurelio Ravarini

PDF

Employee Engagement with a Corporate Physical Activity Program: the Global Corporate Challenge, Pascal Scherrer, Lynnaire Sheridan, Ruth Sibson, Maria Ryan, and Nadine Henley

PDF

Interrogation of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, and Dean Diepeveen

PDF

Testing an exergame for effectiveness and attractiveness, Jeffrey Ronald Sinclair, Philip Hingston, Martin Masek, and Kazunori Nosaka

PDF

Assemblage turnover and taxonomic sufficiency of subtidal macroalgae at multiplespatial scales, Dan A. Smale, Gary A. Kendrick, and Thomas Wernberg

PDF

An investigation into short term latex pricing and national production forecasting decision support system for the public agricultural rubber industry in Thailand, Panida Subsorn

Link

An Evaluation of Agile Software Methodology Techniques, Anuradha Sutharshan and Stanislaw Maj

Link

An Efficient Method for Collecting Large Samples of Live Copepods Free from Detritus, Carl J Svensson, Glenn Hyndes, and Paul Lavery

PDF

The ADSL Router Forensics Process, Patryk Szewczyk

PDF

Ignorant Experts: Computer and Network Security Support From Internet Service Providers, Patryk Szewczyk and Craig Valli

PDF

An Analysis of Information Security Awareness within Home and Work Environments, Shuhaili Talib, Nathan Clarke, and Steven Furnell

PDF

The Western Australian charter boat industry: Working towards long-term sustainability, Carli Telfer

Link

Ecological performance and possible origin of a ubiquitous but under-studied gastropod, Mad S. Thomsen, Thomas Wernberg, Fernando Tuya, and Brian Silliman

PDF

Proximity to rocky reefs alters the balance between positive and negative effects on seagrass fauna, Fernando Tuya, Mathew Vanderklift, Glenn Hyndes, Thomas Wernberg, Mads Thomsen, and Christine Hanson

PDF

Application of a Data Mining Framework for the Identification of Agricultural Production Areas in WA, Yunous Vagh, Leisa Armstrong, and Dean Diepeveen

Link

Developing VoIP Router honeypots, Craig Valli and Mohammed Al Lawati

Link

Geotagging Where Cyberspace Comes to Your Place, Craig Valli and Peter Hannay

PDF

Stable isotopes reveal a consistent consumer-diet relationship across hundreds of kilometres, Mathew A. Vanderklift and Thomas Wernberg

Link

Fire in Rangelands and its Role in Management, Eddie Van Etten